ISO 15693-Compliant 64-Bit UID
Request Data for the Inventory Command
REQUEST FLAGS
(1 Byte)
COMMAND
01h
AFI
(NOTE 1)
(1 Byte)
MASK LENGTH
(1 Byte)
MASK PATTERN
(NOTE 2)
(Up to 8 Bytes)
Note 1: The AFI byte is transmitted only if the AFI_flag bit is set to 1. The AFI byte, if transmitted, narrows the range of slaves that
qualify for responding to the request.
Note 2: The mask pattern is transmitted only if the selection mask length is not 0. If the mask length is not an integer multiple of 8,
the MSB of the mask pattern must be padded with 0 bits. The LSb of the mask pattern is transmitted first.
Response Data for the Inventory Command (No Error)
RESPONSE FLAGS
00h
DSFID
(1 Byte)
UID
(8 Bytes)
Network Function Commands
The command descriptions show the data fields of the
request and response data packets. To create the com-
plete frame, an SOF, 16-bit CRC, and EOF must be
added (see Figure 4). The ISO 15693 standard defines
four network function commands: Inventory, Stay Quiet,
Select, and Reset to Ready. This section describes the
format of the request and response data packets.
Inventory
The Inventory command allows the master to learn the
UIDs and DSFIDs of all slaves in its RF field in an itera-
tive process. It is the only command for which the
Inventory_flag bit must be 1. The Inventory command
uses two command-specific parameters, which are the
mask length and the mask pattern. The mask allows the
master to preselect slaves for responding to the
Inventory command. The LSb of the mask aligns with
the LSb of the slave’s UID. The master can choose not
to use a mask, in which case all slaves qualify, provid-
ed they are not excluded by the AFI criteria (see the
Request Flags section). The maximum mask length is
60 (3Ch, if Nb_slots_flag = 0) or 64 (40h, if
Nb_slots_flag = 1). The mask pattern defines the least
significant bits (as many as specified by the mask
length) that a slave’s UID must match to qualify for
responding to the Inventory command (case
Nb_slots_flag = 1). If the slot counter is used
(Nb_slots_flag = 0), the value of the slot counter
extends the mask pattern at the higher bits for compari-
son to the slave’s UID. The slot counter starts at 0 after
the inventory request frame is transmitted and incre-
ments during the course of the Inventory command with
every subsequent EOF sent by the master. The pro-
cessing of an Inventory command ends when the mas-
ter sends the SOF of a new frame.
Response data for the Inventory command (no error) is
transmitted only if a slave qualifies to respond. In case
of an error in the request, slaves do not respond.
When receiving the Inventory command, the slave
devices in the RF field enter the collision management
sequence. If a slave meets the conditions to respond, it
sends out a response data packet. If multiple slaves
qualify, e.g., AFI, mask, and slot counter are not used,
the response frames collide and are not readable. To
receive readable response frames with the UID and
DSFID, the master must eliminate the collision.
Not knowing the slave population, the master could
begin with a mask length of 0 and activate the slot
counter. By using this method and going through all 16
slots, the master has a chance to receive clean
responses (i.e., the slave is identified) as well as collid-
ing responses. To prevent a slave that has been identi-
fied from further participating in the collision
management sequence, the master transitions it to the
quiet state. Next, the master issues another Inventory
command where the slot number that previously gener-
ated a collision is now used as a 4-bit mask, and runs
again through all 16 slots. If a collision is found, another
inventory command is issued, this time with a mask that
is extended at the higher bits by the slot counter value
that produced the collision. This process is repeated
until all slaves are identified. For a full description of the
Inventory command processing by the slave device
and the timing specifications, refer to ISO 15693 Part 3,
Sections 8 and 9.
______________________________________________________________________________________
11
相关PDF资料
MAX6611AUT+T IC TEMP SENS LOW PWR SOT23-6
MAX66120K-000AA+ IC RFID UID 1KB TYPEB MEM KEYFOB
MAX6612MXK+T IC TEMP SENSOR ANLG SC70-5
MAX6613MXK+TCA3 IC ANLG TEMP SENSOR SC70-5
MAX66140K-000AA+ IC RFID UID 64BIT TYPE B KEY FOB
MAX6667AUT+T IC TEMP SENSOR PWM OUT SOT23-6
MAX6672AXK+T IC TEMP SENSOR PWM OUT SC70-5
MAX6676AUT+T IC TEMP SENSOR PWM OUT SOT23-6
相关代理商/技术参数
MAX66100K-00AA+ 制造商:Maxim Integrated Products 功能描述:ISO 15693-COMPLIANT 64-BIT UID FOB - Rail/Tube
MAX6610AUT 制造商:Maxim Integrated Products 功能描述:PRECISION, LOW-POWER, 3-PIN SC70 VO - Rail/Tube
MAX6610AUT+ 制造商:Maxim Integrated Products 功能描述:TEMP SENSOR ANLG 6PIN SOT-23 - Rail/Tube 制造商:Maxim Integrated Products 功能描述:TEMPERATURE SENSORS AND VOLTAGE REFERENC
MAX6610AUT+T 功能描述:板上安装温度传感器 Precision 6-Pin Temperature Sensor RoHS:否 制造商:Omron Electronics 输出类型:Digital 配置: 准确性:+/- 1.5 C, +/- 3 C 温度阈值: 数字输出 - 总线接口:2-Wire, I2C, SMBus 电源电压-最大:5.5 V 电源电压-最小:4.5 V 最大工作温度:+ 50 C 最小工作温度:0 C 关闭: 安装风格: 封装 / 箱体: 设备功能:Temperature and Humidity Sensor
MAX6610AUT-T 功能描述:板上安装温度传感器 RoHS:否 制造商:Omron Electronics 输出类型:Digital 配置: 准确性:+/- 1.5 C, +/- 3 C 温度阈值: 数字输出 - 总线接口:2-Wire, I2C, SMBus 电源电压-最大:5.5 V 电源电压-最小:4.5 V 最大工作温度:+ 50 C 最小工作温度:0 C 关闭: 安装风格: 封装 / 箱体: 设备功能:Temperature and Humidity Sensor
MAX6610EUT-T 制造商:Maxim Integrated Products 功能描述:PRECISION, LOW-POWER, 3-PIN SC70 VOLTAGE REFE - Tape and Reel
MAX6611AUT 制造商:Maxim Integrated Products 功能描述:PRECISION LOW-POWER 3-PIN SC70 VO - Cut Tape Product
MAX6611AUT+ 制造商:Maxim Integrated Products 功能描述:TEMP SENSOR DGTL 6PIN SOT-23 - Rail/Tube